Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security for digital data storage

Inactive Publication Date: 2005-02-15
ROUND ROCK RES LLC
View PDF44 Cites 160 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The use of personal computers in these applications raises data security and privacy issues which have thus far been insufficiently resolved.
Laptop and other personal computers, as well as the removable data storage media used in them are transported, mislaid, lost, and sometimes stolen.
For home users, concerns arise if credit card, social security, or bank account numbers are present on fixed or removable media which may be lost or stolen.
This provides limited security, however, since these schemes are easy to defeat with widely available password extraction programs.
Although the security provided by this system is adequate for many applications, the circuitry used to implement the system is complex, and administration of the system for producing and assigning keys and smart cards is time consuming and expensive.
This requires additional logic to encrypt the keys as well as the data, and consequently, this system requires relatively complex circuitry, and leaves the key potentially recoverable from the tape itself if the key encryption scheme is broken.
Thus, existing encryption systems for personal and portable computers have serious drawbacks, and have not been widely implemented.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security for digital data storage
  • Data security for digital data storage
  • Data security for digital data storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Embodiments of the invention will now be described with reference to the accompanying Figures, wherein like numerals refer to like elements throughout. The terminology used in the description presented herein is not intended to be interpreted in any limited or restrictive manner, simply because it is being utilized in conjunction with a detailed description of certain specific embodiments of the invention. Furthermore, embodiments of the invention may include several novel features, no single one of which is solely responsible for its desirable attributes or which is essential to practicing the invention herein described.

Referring now to FIG. 1, a data storage system is illustrated which incorporates aspects of the invention. The system includes encryption / decryption logic 10 that is connected to receive digital data from a data bus 12. The encryption / decryption logic 10 is configured to forward data received from the data bus 12 to data storage devices 14 in an encrypted form. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computing system includes data encryption in the data path between a data source and data storage devices. The data encryption may utilize a key which is derived at least in part from an identification code stored in a non-volatile memory. The key may also be derived at least in part from user input to the computer.

Description

BACKGROUND OF THE INVENTION1. Field of the InventionThe invention relates to methods and apparatus for providing security for digital data stored on data storage media such as magnetic and optical disks and tapes.2. Description of the Related ArtOver the past several years, personal computing systems have become more powerful, smaller, and less expensive. As this has occurred, more and more computing applications are performed on personal computer platforms. Local and wide area networks of personal computers are now often used in corporate and business applications instead of the large mainframes used for the same applications in the past. A further result of the increases in performance and decreases in price of personal computers is a dramatic increase in personal computer use for household financial and other sensitive and preferably confidential information.The use of personal computers in these applications raises data security and privacy issues which have thus far been insuff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00H04L9/08
CPCG06F21/80G06F21/85H04L9/0861H04L9/0894H04L9/0866H04L2209/12
Inventor KLEIN, DEAN A.
Owner ROUND ROCK RES LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products